1.For the 8-bit word 00111001, the check bits stored with it would be 0111. Suppose when the word is read from memory, the check bits are calculated to be 1101.What is the data word that was read from memory?
A. 10011001
B. 00011001
C. 00111000
D. 11000110
View/Hide Ans Correct Answer is B
Explanation
2.
Consider a 32 - bit microprocessor, with a 16 - bit external data bus, driven by an 8 MHz input clock. Assume that the microprocessor has a bus cycle whose minimum duration equals four input clock cycles. What is maximum data transfer rate for this microprocessor ?
A. 8 x 106 bytes / sec
B. 4 x 106 bytes / sec
C. 16 x 106 bytes / sec
D. 4 x 109 bytes / sec
View/Hide Ans Correct Answer is B
Explanation
3. The RST 7 instruction in 8085 microprocessor is equivalent to
A. CALL 0010 H
B. CALL 0034 H
C. CALL 0038 H
D. CALL 003C H
View/Hide Correct Answer is C
Ans
Explanation
4. The equivalent hexadecimal notation for octal number 2550276 is:
A. FADED
B. AEOBE
C. ADOBE
D. ACABE
View/Hide Ans Correct Answer is C
Explanation
5.
The CPU of a system having 1 MIPS execution rate needs 4 machine cycles on an average for executing an instruction. The fifty percent of the cycles use memory bus. A memory read/write employs one machine cycle. For execution of the programs, the system utilizes 90 percent of the CPU time. For block data transfer, an IO device is attached to the system while CPU executes the background programs continuously. What is the maximum IO data transfer rate if programmed IO data transfer technique is used?
A. 500 Kbytes/sec
B. 2.2 Mbytes/sec
C. 125 Kbytes/sec
D. 250 Kbytes/sec
View/Hide Ans Correct Answer is D
Explanation
6. The number of Flip-Flops required to design a modulo - 272 counter is
A. 8
B. 9
C. 27
D. 11
View/Hide Ans Correct Answer is B
Explanation
7.
Let E1 and E2 be two entities in E-R diagram with simple single valued attributes. R1 and R2 are two relationships between E1 and E2 where R1 is one-many and R2 is many - many. R1 and R2 donot have any attributes of their own. How many minimum number of tables are required to represent this situation in the relational model ?
A. 4
B. 3
C. 2
D. 1
View/Hide Ans Correct Answer is A
Explanation
8.
The student information in a university is stored in the relation STUDENT (name, sex, marks, dept_Name) Consider the following SQL query select deptName from STUDENT where sex = 'M' group by dept_Name having avg (marks) > (select avg (marks) from STUDENT) It returns the names of the department in which
A. the average marks of male students is more than the average marks of the students in the same department
B. The average marks of male students is more than the average marks of the students in the university
C. The average marks of male students is more than the average marks of male students in the university
D. The average marks of students is more than the average marks of male students in the university
View/Hide Correct Answer is D
Ans
Explanation
9. Which one of the following statements about normal forms is FALSE?
A. Lossless, preserving decomposition into 3NF is always possible
B. Lossless, preserving decomposition into BCNF is always possible
C. Any relation with two attributes is in BCNF
D. BCNF is stronger than 3NF
View/Hide Ans Correct Answer is B
Explanation
10. The relation vendor order (v_no, v_ord_no, v_name, qty_sup, unit_price) is in 2NF because :
A. Non key attribute V_name is dependent on V_no which is part of composite key
B. Non key attribute V_name is dependent on qty_sup
C. key attribute qty_sup is dependent on primary_key unit price
D. key attribute v_ord_no is dependent on primary_key unit price
View/Hide Ans Correct Answer is A
Explanation
Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015
11. the relational schemas R1 and R2 form a loseless join decomposition of R if and only if
A. R1∧R2-->(R1-R2)
B. R1-->R2
C. R1∧R2-->(R2-R1)
D. R2-->R1∧R2
View/Hide Ans Correct Answer is C
Explanation
12. In the index allocation scheme of blocks to a file, the maximum possible size of the file depends on
A. The number of blocks used for the index, and the size of the index
B. The size of the blocks, and the size of the address
C. size of the index
D. size of the blocks
View/Hide Ans Correct Answer is A
Explanation
13. Give the number of principal vanishing point (s) along with their direction for the standard perspective transformation :
A. only one in the direction K
B. Two in the directions I and J
C. Three in the directions I, J and K
D. Only two in the directions J and K
View/Hide Ans Correct Answer is A
Explanation
14.Consider a triangle represented by A(0, 0), B(1, 1), C(5, 2). The triangle is rotated by 45 degrees about a point P( -1, -1). The co-ordinates of the new triangle obtained after rotation shall be
A. A'(-1, √2 -1), B'(-1, 2√2 - 1), C'((3/2)√2 - 1, (9/2)√2 - 1)
B. A'(√2 -1,- 1), B'( 2√2 - 1, -1), C'((3/2)√2 - 1, (9/2)√2 - 1)
C. A'(-1, √2 -1), B'(2√2 - 1, -1), C'((3/2)√2 - 1, (9/2)√2 - 1)
D. A'(-1, √2 -1), B'( 2√2 - 1, -1), C'((9/2)√2 - 1, (3/2)√2 - 1)
View/Hide Ans Correct Answer is A
Explanation
15. The process of dividing an analog signal into a string of discrete outputs, each of constant amplitude is called
A. Strobing
B. Amplification
C. Conditioning
D. Quantization
View/Hide Ans Correct Answer is D
Explanation
16. which of the following is not a basic primitive of the graphics kernel system(GKS) ?
A. POLYLINE
B. POLYDRAW
C. FILL AREA
D. POLYMARKER
View/Hide Ans Correct Answer is B
Explanation
17. Which of the following statements is/are incorrect ?
A.Mapping the co-ordinates of the points and lines that form the picture into appropriate co-ordinates on the device or workstation is known as viewing transformation.
B. The right handed cartesian co-ordinate system in whose coordinates we describe the picture is known as world coordinate system.
C. The co-ordinate system that corresponds to the device or workstation where the image is to be displayed is known as physical device co-ordinate system.
D.
Left-handed co-ordinate system in which the display area of the virtual display device corresponds to the unit(|x|) square whose lower left handed corner is at origin of the co-ordinate system, is known as normalized device co-ordinate system.
View/Hide Ans Correct Answer is D
Explanation
18.
Match the following
List-I List-II
Flood Gun An electron gun designed to flood the entire screen with electrons.
Collector Partly energised by flooding gun, stores the charge generated by the writing gun
Ground used to discharge the collector
Phosphorus Grains
used in memory -tube display and similar to those used in standard CRT
Writing Gun System
used in memory -tube display and basically the same as the electron gun used in a conventional CRT.
Codes : (a) (b) (c) (d) (e)
A. (i) (ii) (iii) (iv) (v)
B. (ii) (iii) (i) (iv) (v)
C. (iii) (i) (ii) (v) (iv)
D. (iv) (v) (i) (ii) (iii)
View/Hide Correct Answer is A
Ans
Explanation
19. Minimal Deterministic finite automaton for the language L = { 0n | n > 0, n ≠ 4 } will have
A. 1 final state among 5 states
B. 4 final states among 5 states
C. 1 final state among 6 states
D. 5 final states among 6 states
View/Hide Ans Correct Answer is D
Explanation
20. The regular expression corresponding to the language L where L = { x ∈ {0,1}* | x ends with 1 and does not contain substring 00 } is
A. (1 + 01)*(10 + 01)
B. (1 + 01)*01
C. (1 + 01)*(1 + 01)
D. (10 + 01)* 01
View/Hide Ans Correct Answer is C
Explanation
Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015
21. The transition function for the language L = {w|na(w) and nb(w) are both odd} is given by:
δ(q0, a) = q1 δ(q0, b) = q2
δ(q1, a) = q0 δ(q1, b) = q3
δ(q2, a) = q3 δ(q2, b) = q0
δ(q3, a) = q2 δ(q3, b) = q1
the initial and final states of automata are
A. q0 and q0 respectively
B. q0 and q1 respectively
C. q0 and q2 respectively
D. q0 and q3 respectively
View/Hide Ans Correct Answer is D
Explanation
22. The clausal form of the disjunctive normal form ¬A ∨ ¬B ∨ ¬C ∨D is
A. A ∧ B ∧ C ⇒ D
B. A ∨ B ∨ C ∨ D ⇒ true
C. A ∧ B ∧ C ∧ D ⇒ true
D. A ∧ B ∧ C ∧ D ⇒ false
View/Hide Ans Correct Answer is A
Explanation
23. Which of the following is false for the programming language PROLOG ?
A. A PROLOG variable can only be assigned to a value once
B. PROLOG is a Strongly Typed Language.
C. The scope of a variable in PROLOG is a single clause or rule.
D. the scope of a variable in PROLOG is a Single Query
View/Hide Ans Correct Answer is B
Explanation
24. Which one of the following is true ?
A. The resolvent of two horn clauses is not a horn clause.
B. The resolvent of two horn clauses is a Horn Clause.
C. if we resolve a negated goal G against a fact or rule A to get Clause C then C has positive literal and non null goal.
D. if we resolve a negated goal G against a fact or rule A to get clause C then C has positive literal or null goal.
View/Hide Ans Correct Answer is B
Explanation
25. Which transmission technique guarantees that data packets will be received by the receiver in the same order in which they were sent by the sender ?
A. Broadcasting
B. Unicasting
C. Packet Switching
D. Circuit Switching
View/Hide Ans Correct Answer is D
Explanation
26. Which of the following control fields in TCP header is used to specify the sender has no more data to transmit ?
A. FIN
B. RST
C. SYN
D. PSH
View/Hide Ans Correct Answer is A
Explanation
27. Which are the two modes of IP security ?
A. Transport and Certificate
B. Transport and Tunnel
C. Certificate and Tunnel
D. Preshared and Transport
View/Hide Ans Correct Answer is B
Explanation
28.A message "COMPUTERNETWORK" encrypted(ignore quotes)using columnar transposition cipher with a key "LAYER". the encrypted message is :
A. CTTOEWMROPNRUEK
B. MROUEKCTTPNROEW
C. OEWPNRCTTUEKMRO
D. UEKPNRMROOEWCTT
View/Hide Ans Correct Answer is C
Explanation
29.
Suppose a digitized voice channel is made by digitizing 8 kHz bandwidth analog voice signal. It is required to sample the signal at twice the highest frequency(two samples per hertz). what is the bit rate required, if it is assumed that each sample requires 8 bits ?
A. 32 kbps
B. 64 kbps
C. 128 kbps
D. 256 kbps
View/Hide Ans Correct Answer is C
Explanation
30. The Maximum payload of a TCP segment is
A. 65535
B. 65515
C. 65495
D. 65475
View/Hide Ans Correct Answer is C
Explanation
Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015
31. All pair Shortest paths problem is efficiently solved using :
A. Dijkstra' algorithm
B. Bellman-Ford algorithm
C. Kruskal Algorithm
D. Floyd-Warshall algorithm
View/Hide Ans Correct Answer is D
Explanation
32. The travelling salesman problem can be solved in :
A. Polynomial time using dynamic programming algortihm
B. Polynomial time using branch and bound algortihm
C. Exponential time using dynamic programming algorithm or branch and bound algorithm.
D. Polynomial time using backtracking algorithm.
View/Hide Ans Correct Answer is C
Explanation
33. Which of the following is asymptotically smaller ?
A. lg(lg*n)
B. lg*(lg n)
C. lg(n!)
D. lg*(n!)
View/Hide Ans Correct Answer is A
Explanation
34.Consider a hash table of size m=100 and the hash function h(k) = floor(m(kA mod 1)) for A = (√5 − 1)/2 = 0.618033. Compute the location to which the key k = 123456 is placed in hash table.
A. 77
B. 82
C. 88
D. 89
View/Hide Ans Correct Answer is C
Explanation
35. Let f(n) and g(n) be asymptotically non-negative functions. which of the following is correct ?
A. θ(f(n) * g(n)) = min(f(n), g(n))
B. θ(f(n) * g(n)) = max(f(n), g(n))
C. θ(f(n) + g(n)) = min(f(n), g(n))
D. θ(f(n) + g(n)) = max(f(n), g(n))
View/Hide Ans Correct Answer is D
Explanation
36. The number of nodes of height h in any n - element heap is _____
A. h
B. zh
C. ceil(n/zh)
D. ceil(n/zh + 1)
View/Hide Ans Correct Answer is D
Explanation
37. In Java, when we implement an interface method, it must be declared as :
A. Private
B. Protected
C. Public
D. Friend
View/Hide Ans Correct Answer is C
Explanation
38. The Servlet Response interface enables a servlet to formulate a response for a client using the method ______
A. void log(Exception e, String s)
B. Void destroy()
C. int getServerPort()
D. void setContextType(String Type)
View/Hide Ans Correct Answer is D
Explanation
39. Which one of the following is correct ?
A. Java Applets cannot be written is many programming languages.
B. An applet is not a small program.
C. An applet can be run on its own.
D. Applets are embedded in another applications.
View/Hide Ans Correct Answer is D
Explanation
40. In XML we can specify the frequency of an element by using the symbols :
A. + * !
B. # * !
C. + * ?
D. - * ?
View/Hide Ans Correct Answer is C
Explanation
Answer Key and Solved Questions Paper-3 UGC-NET Computer Science June 2015
41. In XML, Doctype declaration specifies to include a reference to ____ file
A. Document Type Definition
B. Document Type Declaration
C. Document Transfer Definition
D. Document Type language
View/Hide Ans Correct Answer is A
Explanation
42. Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule ?
A. Inheritance
B. Polymorphism
C. Encapsulation
D. Abstraction
View/Hide Ans Correct Answer is C
Explanation
43. Verification :
A. refers to the set of activities that ensure that software correctly implements a specific function.
B. gives answer to the question - are we building the product right ?
C. requires execution of software
D. both 1 and 2
View/Hide Ans Correct Answer is D
Explanation
44. Which design matric is used to measure the compactness of the program in terms of lines of code ?
A. Consistency
B. Conciseness
C. Efficiency
D. Accuracy
View/Hide Ans Correct Answer is B
Explanation
45. Requirements prioritization and negotiation belongs to :
A. Requirements validation
B. Requirements elicitation
C. Feasibility Study
D. Requirement reviews
View/Hide Ans Correct Answer is B
Explanation
46. Adaptive maintenance is a maintenance which ______
A. Correct errors that were not discovered till testing phase.
B. is carried out to port the existing software to a new environment.
C. improves the system performance.
D. both (2) and (3)
View/Hide Ans Correct Answer is B
Explanation
47. A design concept refinement is a
A. Top-down Approach
B. Complementary of Abstraction concept
C. Process of elaboration
D. All of the above
View/Hide Ans Correct Answer is D
Explanation
48. A software design is highly modular if :
A. cohesion is functional and coupling is data type.
B. cohesion is coincidental and coupling is data type.
C. cohesion is sequential and coupling is content type.
D. cohesion is functional and coupling is stamp type.
View/Hide Ans Correct Answer is A
Explanation
49.
Match the following for operating system techniques with the most appropriate advantage :
List-I List-II
(a) Spooling (i) Allows several jobs in memory to improve CPU utilization
(b) Mult iprogramming
{ii) Access to shared resources among geographically dispersed computers in a transparent way
(c) Time sharing overlapping I/O and computations
Distributed Computing
Allows many users to share a computer simultaneously by switching processor frequently
codes : (a) (b) (c) (d)
A. (iii) (i) (ii) (iv)
B. (iii) (i) (iv) (ii)
C. (iv) (iii) (ii) (i)
D. (ii) (iii) (iv) (i)
View/Hide Ans Correct Answer is B
Explanation
50. Which of the following statements is not true for Multi Level Feedback Queue processor scheduling algorithm ?
A. Queues have different priorities.
B. Each queue may have different scheduling algorithm
C. Processes are permanently assigned to a queue
D. This algorithm can be configured to match a specific system under design
View/Hide Ans Correct Answer is C
Explanation
51.What is the most appropriate function of Memory Management Unit (MMU) ?A.It is an associative memory to store TLBB.It is a technique of supporting multi programming by creating dynamic partitionsC.It is a chip to map virtual address to physical addressD.It is an algorithm to allocate and deallocate main memory to a processView/Hide AnsCorrect Answer is BExplanation52.Dining Philosopher's problem is aA.Producer Consumer problemB.Classical IPC problemC.Starvation ProblemD.Synchronization PrimitiveView/Hide AnsCorrect Answer is BExplanation53.In ______ allocation method for disk block allocation in a file system, insertion and deletion of blocks in a file is easy.A.IndexB.LinkedC.ContiguousD.Bit MapView/Hide AnsCorrect Answer is AExplanation54.A unix file may be of type :A.Regular fileB.Directory FileC.Device FileD.Any one of the aboveView/Hide AnsCorrect Answer is DExplanation55.Match the following :
List-I List-II
(a) Intelligence (i) Contextual, tacit, transfer needs learning
(b) Knowledge (ii) Scattered facts, easily transferrable
(c) Information (iii) Judgemental
(d) Data (iv) Codifiable, endorsed with relevance and purpose
codes : (a) (b) (c) (d)A.(iii) (ii) (iv) (i)B.(iii) (i) (iv) (ii)C.(i) (ii) (iii) (iv)D.(i) (iii) (iv) (ii)View/Hide AnsCorrect Answer is BExplanation74.WOW32 is aA.Win 32 API library for creating processes and threads.B.Special kind of file system to the NT name space.C.Kernel - mode objects accessible through Win32 APID.Special execution environment used to run 16 bit windows applications on 32 - bit machines.View/Hide AnsCorrect Answer is DExplanation75.The Unix command : $ vi file1 file2A.Edits file1 and stores the contents of file1 in file2B.Both files i.e File1 and file2 can be edited using "ex" command to travel between filesC.Both files can be edited using the "mv" command to move between the filesD.Edits file1 first, saves it and the edits file2View/Hide AnsCorrect Answer is BExplanation
Operating System
1.If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks requests are 98, 37, 14, 124, 65, 67.
A. 239
B. 310
C. 321
D. 325
View/Hide Ans Correct Answer is c
Explanation
2. Which of the following memory allocation scheme suffers from external fragmentation ?
A. Segmentation
B. Pure demand paging
C. Swapping
D. Paging
View/Hide Ans Correct Answer is a
Explanation
3.Consider a system having m resources of the same type. These resources are shared by 3 processes A, B and C which have peak demands of 3, 4 and 6 respectively. For what value of m deadlock will not occur ?
A. 7
B. 9
C. 10
D. 13
View/Hide Ans Correct Answer is d
Explanation
4. Pre-emptive scheduling is the strategy of temporarily suspending a running process
A. before the CPU time slice expires
B. to allow starving processes to run
C. when it requests I/O
D. to avoid collision
View/Hide Ans Correct Answer is a
Explanation
5. Resources are allocated to the process on non-sharable basis is
A. mutual exclusion
B. hold and wait
C. no pre-emption
D. circular wait
View/Hide Ans Correct Answer is a
Explanation
6. In round robin CPU scheduling as time quantum is increased the average turn around time
A. increases
B. decreases
C. remains constant
D. varies irregularly
View/Hide Ans Correct Answer is d
Explanation
7.Pool based allocation of memory achieves better usage. Memory can be preempted from inactive programs and used to accommodate active programs. This is called
A. Preemption
B. Swapping
C. Spooling
D. Scheduling
View/Hide Ans Correct Answer is b
Explanation
8. Which of these is an example of a virtual resource?
A. Print server
B. Virtual machine
C. Virtual memory
D. All of the above
View/Hide Ans Correct Answer is d
Explanation
9. Which concept explains the working of an Operating System?
A. It is event driven
B. It is object oriented
C. It is procedure based system software
D. It is a collection of procedures that interact with each other
View/Hide Ans Correct Answer is a
Explanation
10. Which of these is/are the desirable features of an Operating system
A. Extensible
B. Portable
C. Reliable
D. All of the above
View/Hide Ans Correct Answer is d
Explanation
11. Blocking and Caching are the terms associated with which Operating system functions respectively
A. Memory management and Disk Scheduling
B. IOCS and Disk Scheduling
C. IOCS and Memory management
D. Process management and IOCS
View/Hide Ans Correct Answer is b
Explanation
12. Which of these is not a term describing the collection of Operating Programs
A. Monitor
B. Kernel
C. Supervisor
D. Server
View/Hide Ans Correct Answer is d
Explanation
13. Transparency is a desirable feature of which type of Operating system-
A. Batch Processing
B. Real time
C. Distributed
D. Time sharing
View/Hide Ans Correct Answer is c
Explanation
14. Which operating system implementation has to focus on the issue of Good response time
A. Batch Processing
B. Multiprogramming
C. Distributed
D. Time sharing
View/Hide Ans Correct Answer is d
Explanation
15. Program Priorities, Preemption are the key concepts of
A. Batch Processing
B. Real time
C. multiprogramming
D. Time sharing
View/Hide Ans Correct Answer is c
Explanation
16. Which operating system implementation has to focus on the issue of resource sharing?
A. Batch Processing
B. Multiprogramming
C. Distributed
D. Time sharing
View/Hide Ans Correct Answer is c
Explanation
17. This OS interleaves execution of processes in an application program to meet its deadline
A. Batch Processing
B. Real time
C. multiprogramming
D. Time sharing
View/Hide Ans Correct Answer is b
Explanation
18. What in multiprogramming OS provides a foolproof method of implementing memory protection to avoid program interference?
A. Direct Memory Access
B. Privileged mode
C. Memory Protection
D. Both 2 and 3
View/Hide Ans Correct Answer is d
Explanation
19. What are the functions of multiprogramming OS?
A. Scheduling
B. Memory Management
C. I/O management
D. All of above
View/Hide Ans Correct Answer is d
Explanation
20. Applications like Banking and reservations require which type of OS?
A. Real Time
B. Hard Real Time
C. Soft Real Time
D. None of the above
View/Hide Ans Correct Answer is c
21. What feature of RTOS is supported by executing parts of a computation in different computer systems?
A. Computation speed up
B. Resource sharing
C. Reliability
D. Communication
View/Hide Ans Correct Answer is a
Explanation
22. Which OS employs the techniques of fault tolerance and graceful degradation to ensure continuity of operation?
A. Batch Processing
B. Real time
C. Distributed
D. Time sharing
View/Hide Ans Correct Answer is b
Explanation
23.Pool based allocation of memory achieves better usage. Memory can be preempted from inactive programs and used to accommodate active programs. This is called
A. Preemption
B. Swapping
C. Spooling
D. Scheduling
View/Hide Ans Correct Answer is b
Explanation
24. Which of these is an example of a virtual resource?
A. Print server
B. Virtual machine
C. Virtual memory
D. All of the above
View/Hide Ans Correct Answer is d
Explanation
25. Which concept explains the working of an Operating System?
A. It is event driven
B. It is object oriented
C. It is procedure based system software
D. It is a collection of procedures that interact with each other
View/Hide Ans Correct Answer is a
Explanation
26. Which of these is/are the desirable features of an Operating system
A. Extensible
B. Portable
C. Reliable
D. All of the above
View/Hide Ans Correct Answer is d
Explanation
27. Blocking and Caching are the terms associated with which Operating system functions respectively
A. Memory management and Disk Scheduling
B. IOCS and Disk Scheduling
C. IOCS and Memory management
D. Process management and IOCS
View/Hide Ans Correct Answer is b
Explanation
28. Which of these is not a term describing the collection of Operating Programs
A. Monitor
B. Kernel
C. Supervisor
D. Server
View/Hide Ans Correct Answer is d
Explanation
29. Transparency is a desirable feature of which type of Operating system-
A. Batch Processing
B. Real time
C. Distributed
D. Time sharing
View/Hide Ans Correct Answer is c
Explanation
30. Which operating system implementation has to focus on the issue of Good response time
A. Batch Processing
B. Multiprogramming
C. Distributed
D. Time sharing
View/Hide Correct Answer is d
Ans
31. Program Priorities, Preemption are the key concepts of
A. Batch Processing
B. Real time
C. multiprogramming
D. Time sharing
View/Hide Ans Correct Answer is c
Explanation
32. Which operating system implementation has to focus on the issue of resource sharing?
A. Batch Processing
B. Multiprogramming
C. Distributed
D. Time sharing
View/Hide Ans Correct Answer is c
Explanation
33. This OS interleaves execution of processes in an application program to meet its deadline
A. Batch Processing
B. Real time
C. multiprogramming
D. Time sharing
View/Hide Ans Correct Answer is b
Explanation
34. What in multiprogramming OS provides a foolproof method of implementing memory protection to avoid program interference?
A. Direct Memory Access
B. Privileged mode
C. Memory Protection
D. Both 2 and 3
View/Hide Ans Correct Answer is d
Explanation
35. What are the functions of multiprogramming OS?
A. Scheduling
B. Memory Management
C. I/O management
D. All of above
View/Hide Ans Correct Answer is d
Explanation
36. Applications like Banking and reservations require which type of OS?
A. Real Time
B. Hard Real Time
C. Soft Real Time
D. None of the above
View/Hide Ans Correct Answer is c
Explanation
37. What feature of RTOS is supported by executing parts of a computation in different computer systems?
A. Computation speed up
B. Resource sharing
C. Reliability
D. Communication
View/Hide Ans Correct Answer is a
Explanation
38. Which OS employs the techniques of fault tolerance and graceful degradation to ensure continuity of operation?
A. Batch Processing
B. Real time
C. Distributed
D. Time sharing
View/Hide Ans Correct Answer is b
Explanation
39.If ttra and tcam are the time taken to transfer a block from memory to cache and access time of cache memory respectively, then what will be the effective memory access time if h is the hit ratio
A. h+ ttra *(1+ tcam)
B. h*tcam +(1-h) *(ttra+tcam)
C. h +(1-h) *(ttra+tcam)
D. (h+1)*tcam +(1-h) *(ttra+tcam)
View/Hide Ans Correct Answer is b
Explanation
40. Programs tend to make memory accesses that are in proximity of previous access this is called
A. spatial locality
B. temporal locality
C. reference locality
D. access locality
View/Hide Ans Correct Answer is a
Explanation
41. Which term means to access some data and instructions repeatedly?
A. spatial locality
B. temporal locality
C. reference locality
D. access locality
View/Hide Ans Correct Answer is b
Explanation
42.Processor architectures use several levels of cache memories to reduce the effective memory access time. which is the correct match i)L1 Cache a) part of memory chip ii)L2 Cache b) Cache on CPU Chip ii)L3 Cache c) Cache external to CPU
A. i)-a ii)-b iii)-c
B. i)-b ii)-c iii)-a
C. i)-c ii)-b iii)-a
D. i)-c ii)-a iii)-b
View/Hide Ans Correct Answer is b
Explanation
43.An Intel processor uses a cache block size of 128 bytes and a memory transfer to cache is about 10 times the access time of cache memory. with cache hit ratio of 0.97 what percent will be the effective memory access to that of access time of memory
A. 20 percent
B. 30 percent
C. 40 percent
D. 50 percent
View/Hide Ans Correct Answer is c
Explanation
44. Contents of which fields of Program Status Word (PSW) define the subsequent actions of the CPU
A. Condition code, Privileged mode, Program Counter
B. Condition code, Privileged mode, interrupt mask
C. Privileged mode, interrupt mask, interrupt code
D. Privileged mode, interrupt mask, Program Counter
View/Hide Ans Correct Answer is d
Explanation
45. Which of the following should be a privileged instruction-
A. Load Bound registers
B. Load a value in a CPU Register
C. Forcibly terminate a process
D. All of the above
View/Hide Ans Correct Answer is d
Explanation
46. Throughput of a multiprogramming OS that processes n programs over th eperiod of time that starts t0 and ends at tf is
A. (tf-t0)/n
B. tf*n/t0
C. n/(tf-t0)
D. n*tf*t0
View/Hide Ans Correct Answer is c
Explanation
47. Which of these are the reasons for CPU-bound programs having higher priority than the I/O bound programs
A. CPU utilization is better in CPU-bound programs
B. I/O bound programs do not get an opportunity to be executed
C. Period of concurrent CPU and I/O bound activities is rare.
D. All of the above
View/Hide Ans
Explanation
48. Which of these is incorrect in context of Real Time Operating System?
A. Permits creation of multiple processes within an application.
B. Permits priorities to be assigned to the processes.
C. Doesn't allow programmer to define interrupts and interrupt processing routines
D. Provides fault tolerance and graceful degradation capabilities.
View/Hide Ans Correct Answer is c
Explanation
49. Which of these is not a goal of Scheduling Algorithm for Different Operating Systems
A. Fairness
B. balance
C. maximize throughput
D. Policy enforcement
View/Hide Ans Correct Answer is c
Explanation
50. Which of these is a disadvantage of first Come First Serve?
A. Convoy Effect
B. Small average and worst-case waiting times
C. Simplicity
D. non-preemptive
View/Hide Ans Correct Answer is a
51. What is the duration of a time quantum in Round-Robin Scheduling?
A. 10-100 millisec
B. 10-100 nanosec
C. 100-1000 millisec
D. 100-1000 nanosec
View/Hide Ans Correct Answer is a
Explanation
52. As a rule of thumb what percentage of the CPU bursts should be shorter than the time quantum?
A. 80%
B. 70%
C. 60%
D. 50%
View/Hide Ans Correct Answer is a
Explanation
53. Interval between the time since submission of the job to the time its results become available, is called
A. Response Time
B. Throughput
C. Waiting time
D. Turnaround Time
View/Hide Ans Correct Answer is a
Explanation
54. A scheduler which selects processes from Primary memory is called
A. Long Term Scheduler
B. Medium Term Scheduler
C. Short Term Scheduler
D. Job Scheduler
View/Hide Ans Correct Answer is c
Explanation
55. The scheduling in which CPU is allocated to the process with least CPU-burst time is called
A. Priority Scheduling
B. Round Robin Scheduling
C. Multilevel Queue Scheduling
D. Shortest job first Scheduling
View/Hide Ans Correct Answer is d
Explanation
56. Which of the following is a fundamental process state
A. blocked
B. executing
C. Waiting
D. swapped
View/Hide Ans Correct Answer is b
Explanation
57. Which of the following approaches require knowledge of the system state?
A. deadlock detection.
B. deadlock prevention.
C. deadlock avoidance.
D. all of the above.
View/Hide Ans Correct Answer is d
Explanation
58. Which scheduling policy is used for a batch processing operating system
A. Shortest-job First.
B. Round-Robin.
C. Priority Based
D. First-Come-First-Serve.
View/Hide Ans Correct Answer is d
Explanation
59. A critical section is a program segment
A. which is having a higher priority.
B. where shared resources are accessed.
C. which forces deadlocks.
D. where code is shared by programs.
View/Hide Ans Correct Answer is b
Explanation
60. Which amongst the following is a valid page replacement policy?
A. RU policy (Recurrently used)
B. LRU policy (Least Recently Used)
C. only a
D. both a and b
View/Hide Ans Correct Answer is b
61. SSTF stands for
A. Shortest-Seek-time-first scheduling
B. simple-seek-time-first
C. smallest � seek-time-first.
D. None of the above
View/Hide Ans Correct Answer is a
Explanation
62. Before proceeding with its execution, each process must acquire all the resources it needs is called
A. pre-emption.
B. circular wait.
C. hold and wait
D. deadlock.
View/Hide Ans Correct Answer is c
Explanation
63. The total time to prepare a disk drive mechanism for a block of data to be read from is its
A. Access Time
B. Seek time
C. latency plus seek time
D. Access time plus seek time plus transmission time
View/Hide Ans Correct Answer is c
Explanation
64. Which of these is a technique of improving the priority of process waiting in Queue for CPU allocation
A. Starvation
B. Relocation
C. Promotion
D. Ageing
View/Hide Ans Correct Answer is d
Explanation
65. In which of the following page replacement policies Balady�s anomaly does not occurs? (A) FIFO (B) LRU (C) LFU (D) NRU
A. All of the above
B. B, C and D
C. A and B.
D. Only A
View/Hide Ans Correct Answer is b
Explanation
66. Page fault frequency in an operating system is reduced when the
A. processes tend to be of an equal ratio of the I/O-bound and CPU-bound
B. size of pages is increased
C. locality of reference is applicable to the process
D. processes tend to be CPU-bound
View/Hide Ans Correct Answer is c
Explanation
67. Cycle stealing is a term closely associated with-
A. DMA
B. Virtual Memory
C. Processor Scheduler
D. Disk manager
View/Hide Ans Correct Answer is a
Computer Fundamentals
1. An online backing storage system capable of storing larger quantities of data is
A. CPU
B. Memory
C. Secondary storage
D. Mass Storage
View/Hide Ans Correct Answer is D
Explanation
2. Which of the following does not affect the resolution of a video display image?
A. Bandwidth
B. Raster scan rage
C. Vertical and horizontal lines of resolution
D. Screen Size
View/Hide Ans Correct Answer is a
Explanation
3. Latency time is
A. Time to spin the needed data under head
B. Time to spin the needed data under track
C. Time to spin data under sector
D. All of these
View/Hide Ans Correct Answer is a
Explanation
4. DPI stands for
A. Desktop projection Ink
B. Dot per inch
C. Dot-matrix printer ink
D. Desktop pixel Inch
View/Hide Ans Correct Answer is b
Explanation
5. Databases software may be divided into
A. five distinct categories
B. four distinct categories
C. three distinct categories
D. two distinct categories
View/Hide Ans Correct Answer is c
Explanation
6. File record length
A. Should always be fixed
B. Should always be variable
C. Depends upon the size of file
D. Should be chosen to match the data characteristics.
View/Hide Ans Correct Answer is d
Explanation
7. ......is the time required by a sector to reach below read/write heat
A. Seek Time
B. Latency Time
C. Access Time
D. None
View/Hide Ans Correct Answer is b
Explanation
8. .......is a technique of improving the priority of process waiting in Queue for CPU allocation
A. Starvation
B. Ageing
C. Revocation
D. Relocation
View/Hide Ans Correct Answer is b
Explanation
9. A grammar for a programming language is a formal description of
A. Syntax
B. Semantics
C. Structure
D. Code
View/Hide Ans Correct Answer is c
Explanation
10. ........is a technique of temporarily removing inactive programs from the memory of computer system
A. Swapping
B. Spooling
C. Semaphore
D. Scheduler
View/Hide Ans Correct Answer is a
1. The memory allocation scheme subject to "external" fragmentation is
A. segmentation
B. swapping
C. pure demand paging
D. multiple fixed contiguous partitions
View/Hide Ans Correct Answer is a
Explanation
12. Virtual memory is
A. simple to implement
B. used in all major commercial operating systems
C. less efficient in utilization of memory
D. useful when fast I/O devices are not available
View/Hide Ans Correct Answer is b
Explanation
13. Before proceeding with its execution, each process must acquire all the resources it needs is called
A. hold and wait
B. No pre-emption
C. circular wait
D. starvation
View/Hide Ans Correct Answer is a
Explanation
14. The main reason to encrypt a file is to .......
A. Reduce its size
B. Secure it for transmission
C. Prepare it for backup
D. Include it in the start-up sequence
View/Hide Ans Correct Answer is b
Explanation
15. "LRU" page replacement policy is
A. Last Replaced Unit
B. Last Restored Unit
C. Least Recently Used
D. Least Required Unit
View/Hide Ans Correct Answer is c
Explanation
16. Which of the following is not a fundamental process state
A. ready
B. terminated
C. executing
D. blocked
View/Hide Ans Correct Answer is d
Explanation
17. ODBC stands for
A. Object Database Connectivity
B. Oral Database Connectivity
C. Oracle Database Connectivity
D. Open Database Connectivity
View/Hide Ans Correct Answer is d
Explanation
18. Which two files are used during operations of the DBMS
A. Query languages and utilities
B. DML and query language
C. Data dictionary and transaction log
D. Data dictionary and query language
View/Hide Ans Correct Answer is c
Explanation
19. A protocol is a set of rules governing a time sequence of events that must take place
A. between peers
B. between an interface
C. between modems
D. across an interface
View/Hide Ans Correct Answer is a
Explanation
20. In communication satellite, multiple repeaters are known as
A. detector
B. modulator
C. stations
D. transponders
View/Hide Ans Correct Answer is d
21. Which of the following is required to communicate between two computers?
A. communications software
B. protocol
C. communication hardware
D. all of above including access to transmission medium
View/Hide Correct Answer is d
Ans
Explanation
22. Which of the following is an advantage to using fiber optics data transmission?
A. resistance to data theft
B. fast data transmission rate
C. low noise level
D. All of these
View/Hide Ans Correct Answer is d
Explanation
23. Which of the following is not a transmission medium?
A. telephone lines
B. coaxial cables
C. modem
D. microwave systems
View/Hide Ans Correct Answer is c
Explanation
24. A technique for direct search is
A. Binary Search
B. Linear Search
C. Tree Search
D. Hashing
View/Hide Ans Correct Answer is d
Explanation
25. Two main measures for the efficiency of an algorithm are
A. Processor and memory
B. Complexity and capacity
C. Time and Space
D. Data and Space
View/Hide Ans Correct Answer is c
Explanation
26. The space factor when determining the efficiency of algorithm is measured by
A. Counting the maximum memory needed by the algorithm
B. Counting the minimum memory needed by the algorithm
C. Counting the average memory needed by the algorithm
D. Counting the maximum disk space needed by the algorithm
View/Hide Ans Correct Answer is a
Explanation
27. The memory address of the first element of an array is called
A. floor address
B. foundation address
C. first address
D. base address
View/Hide Ans Correct Answer is d
Explanation
28. The term "push" and "pop" is related to the
A. array
B. lists
C. stacks
D. all of these
View/Hide Ans Correct Answer is c
Explanation
29. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the original link
View/Hide Ans Correct Answer is c
Explanation
30. Repeater operates in which layer of the OSI model?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
View/Hide Ans Correct Answer is a
31. GIF images can have only upto...... colors
A. 128
B. 256
C. 512
D. 1024
View/Hide Correct Answer is b
Ans
Explanation
32. ......is stored on a client and contains state information of the website visited
A. Cookies
B. Servelet
C. History
D. Resident Page
View/Hide Ans Correct Answer is a
Explanation
33......are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
A. Applets
B. Java Bean
C. Sockets
D. Java Component
View/Hide Ans Correct Answer is a
Explanation
34.Encryption is the conversion of data in some intelligible format into an unintelligible format called.....to prevent the data from being understood if read by an unauthorized party.
A. Clear Text
B. Encrypted Text
C. Cipher Text
D. Coded Text
View/Hide Ans Correct Answer is c
Explanation
35.The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as
A. Spooling
B. Contention
C. I/O wait
D. Buffering
View/Hide Ans Correct Answer is d
Explanation
36. Each cell in Microsoft Office Excel documents is referred to by its cell address, which is the......
A. cell�s column label
B. cell�s column label and worksheet tab name
C. cell�s row and column labels
D. cell�s row label
View/Hide Ans Correct Answer is c
Explanation
37. The lowest form of computer language is called
A. BASIC
B. FORTRAN
C. Machine Language
D. COBOL
View/Hide Ans Correct Answer is c
Explanation
38. The portion of the application that you work with in an application software package is the
A. user interface
B. utility interface
C. processing interface
D. analytical interface
View/Hide Ans Correct Answer is a
Explanation
39. A.....provides access to features of the program.
A. menu bar
B. browser
C. Office Assistant
D. feature presentation
View/Hide Ans Correct Answer is a
Explanation
40. Menus are a part of the
A. hardware
B. monitor
C. Status Bar
D. user interface
View/Hide Ans Correct Answer is d
41. Which of the following is the term for a request for specific data contained in a database?
A. question
B. query
C. inquiry
D. quiz
View/Hide Ans Correct Answer is b
Explanation
42. Windows 7 is an example of a(n)
A. application software
B. browser
C. Operating system
D. shareware
View/Hide Ans Correct Answer is c
Explanation
43. The most powerful type of computer.
A. mainframe computers
B. microcomputers
C. minicomputers
D. supercomputers
View/Hide Ans Correct Answer is d
Explanation
44. The system component that controls and manipulates data in order to produce information is called the
A. keyboard
B. microprocessor
C. monitor
D. mouse
View/Hide Ans Correct Answer is b
Explanation
45. Which of the following is not an operating system for mobile phones?
A. Android
B. Symbian
C. iOS
D. All of these are OS for mobile phones
View/Hide Ans Correct Answer is d
Explanation
46. This type of file is created by word processors.
A. worksheet
B. document
C. database
D. presentation
View/Hide Ans Correct Answer is b
Explanation
47.Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use computer technology.
A. graphics
B. input
C. memory
D. wireless
View/Hide Ans Correct Answer is d
Explanation
48.The Internet was launched in 1969 when the United States funded a project that developed a national computer network called
A. Web
B. ISP
C. CERN
D. ARPANET
View/Hide Ans Correct Answer is d
Explanation
49. A(n)......program provides access to Web resources.
A. Web
B. ISP
C. browser
D. URL
View/Hide Ans Correct Answer is c
Explanation
50. Rules for exchanging data between computers are called
A. programs
B. procedures
C. protocols
D. hyperlinks
View/Hide Ans Correct Answer is c
51. The last part of the domain name following the dot(.) is the top........domain
A. Level
B. link
C. locator
D. language
View/Hide Ans Correct Answer is a
Explanation
52. 51.Many individuals create their own personal sites called Web logs, or......
A. social networks
B. blogs
C. wikis
D. search engines
View/Hide Ans Correct Answer is b
Explanation
53. Programs that automatically submit your search request to several search engines simultaneously are called ......
A. metasearch engines
B. inclusive search engines
C. spiders
D. hits
View/Hide Ans Correct Answer is a
Explanation
54. .......cash is the Internet�s equivalent to traditional cash.
A. Universal
B. Web
C. Premium
D. Digital
View/Hide Ans Correct Answer is d
Explanation
55. These programs allow parents as well as organizations to block out selected sites and set time limits on Internet access.
A. plug-ins
B. filters
C. FTP
D. DSL
View/Hide Ans
Explanation
56. ....are narrowly focused on specific disciplines and occupations.
A. Basic applications
B. Business suites
C. Specialized applications
D. Utility programs
View/Hide Ans Correct Answer is c
DBMS
1. Usage of Preemption and Transaction Rollback prevents ______.
A. Unauthorised usage of data file
B. Deadlock situation
C. Data manipulation
D. File preemption
View/Hide Ans Correct Answer is B
Explanation
2. Views are useful for _____ unwanted information, and for collecting together information from more than one relation into a single view.
A. Hiding
B. Deleting
C. Highlighting
D. All of the above
View/Hide Ans Correct Answer is A
Explanation
3. The decision tree classifier is a widely used technique for ______.
A. Classification
B. Association
C. Partition
D. Clustering
View/Hide Ans Correct Answer is A
Explanation
4. Cross_tab displays permit users to view ______ of multidimensional data at a time.
A. 1 − dimension
B. 2 − dimensions
C. 3 − dimensions
D. Multidimensions
View/Hide Correct Answer is B
Ans
Explanation
5. Thoma’s-write rule is ______.
A. Two phase locking protocol
B. Timestamp ordering protocol
C. One phase locking protocol
D. Sliding window protocol
View/Hide Ans Correct Answer is B
Explanation
6. Value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.
A. Logical Integrity
B. Referential Integrity
C. Domain Integrity
D. Data Integrity
View/Hide Ans Correct Answer is B
Explanation
7.The SQL expression Select distinct T, branch_name from branch T, branch S where T.assets ‹ S.assets and S.branch_city= “Mumbai” finds the names of
A. All branches that have greater assets than some branch located in Mumbai.
B. All branches that have greater assets than all branches in Mumbai.
C. The branch that has greatest asset in Mumbai.
D. Any branch that has greater assets than any branch in Mumbai.
View/Hide Ans Correct Answer is A
Explanation
8.
Consider the following schemas : Branch_Schema = (branch_name, assets, city) Customer_Schema = (cutstomer_name, street, city) Deposit_Schema = (branch_name, account_number, customer_name, balance) Borrow_Schema = (branch_name, loan_number, customer_name, amount) Which of the following tuple relational calculus finds all customers who have loan amount more than ` 12,000 ?
A. t(customer_name) | t∈borrow[?] t[amount]›12000}
B. {t |t(customer_name) | t∈borrow[?] t[amount]›12000}
C. {t |[?] ∈ borrow (t(customer_name=s(customer_ name))[?] [amount]›12000}
D. {t |[?] ∈ borrow (t(customer_name)[?] s[amount] ›12000}
View/Hide Ans Correct Answer is C
Explanation
9.
Match the following :(a) Create (i) The E-R Model(b) Select (ii) Relationship Model(c) Rectangle (iii) DDL(d) Record (iv) DMLCodes :(a) (b) (c) (d)
A. (iii) (iv) (i) (ii)
B. (iv) (iii) (ii) (i)
C. (iv) (iii) (i) (ii)
D. (iii) (iv) (ii) (i)
View/Hide Ans Correct Answer is A
Explanation
10. Which of the following is true ?
A. A relation in BCNF is always in 3NF
B. A relation in 3NF is always in BCNF
C. BCNF and 3NF are same
D. A relation in BCNF is not in 3NF
View/Hide Ans Correct Answer is A
11.The User Work Area (UWA) is a set of Program variables declared in the host program to communicate the contents of individual records between
A. DBMS & the Host record
B. Host program and Host record
C. Host program and DBMS
D. Host program and Host language
View/Hide Ans Correct Answer is C
Explanation
12.If a relation with a Schema R is decomposed into two relations R1 and R2 such that (R1 ∪ R2) = R1 then which one of the following is to be satisfied for a lossless joint decomposition (→ indicates functional dependency)
A. (R1 ∩ R2) → R1 or R1 ∩ R2 → R2
B. R1 ∩ R2 → R1
C. R1 ∩ R2 → R2
D. R1 ∩ R2 → R1 and R1 ∩ R2 → R2
View/Hide Ans Correct Answer is A
Explanation
13. Which level of Abstraction describes how data are stored in the data base ?
A. Physical level
B. View level
C. Abstraction level
D. Logical level
View/Hide Ans Correct Answer is A
Explanation
14. Third normal form is based on the concept of ______.
A. Closure Dependency
B. Transitive Dependency
C. Normal Dependency
D. Functional Dependency
View/Hide Ans Correct Answer is B
Explanation
15. Referential integrity is directly related to
A. Relation key
B. Foreign key
C. Primary key
D. Candidate key
View/Hide Ans Correct Answer is B
Explanation
16. In multiuser database if two users wish to update the same record at the same time, they are prevented from doing so by
A. Jamming
B. Password
C. Documentation
D. Record lock
View/Hide Ans Correct Answer is D
Explanation
17. B+ tree are preferred to binary tree in Database because
A. Disk capacity are greater than memory capacities
B. Disk access is much slower than memory access
C. Disk data transfer rates are much less than memory data transfer rate
D. Disks are more reliable than Memory
View/Hide Ans Correct Answer is B
Explanation
18. A Transaction Manager is which of the following ?
A. Maintains a log of transactions
B. Maintains before and after database images
C. Maintains appropriate concurrency control
D. All of the above
View/Hide Ans Correct Answer is D
Explanation
19. What is Granularity ?
A. The size of database
B. The size of data item
C. The size of record
D. The size of file
View/Hide Ans Correct Answer is B
Explanation
20. Which level of Abstraction describes what data are stored in the Database ?
A. Physical level
B. View level
C. Abstraction level
D. Logical level
View/Hide Ans Correct Answer is D
21.The problem that occurs when one transaction updates a database item and then the transaction fails for some reason is ________.
A. Temporary Select Problem
B. Temporary Modify Problem
C. Dirty Read Problem
D. None
View/Hide Ans Correct Answer is C
Explanation
22. Consider a schema R(A, B, C, D) and functional dependencies A → B and C → D. Then the decomposition R1(A, B) and R2(C, D) is
A. Dependency preserving but not lossless join
B. Dependency preserving and lossless join
C. Lossless Join but not dependency preserving
D. Lossless Join
View/Hide Ans Correct Answer is A
Explanation
23. If D1,D2, ....Dn are domains in a relational model, then the relation is a table, which is a subset of
A. D1+D2+... +Dn
B. D1ΧD2Χ ... ΧDn
C. D1∪D2∪... ∪Dn
D. D1−D2−...−Dn
View/Hide Ans Correct Answer is B
Explanation
24. Which of the following is not a type of Database Management System ?
A. Hierarchical
B. Network
C. Relational
D. Sequential
View/Hide Ans Correct Answer is D
Explanation
25. Manager&rsquos salary details are to be hidden from Employee Table. This Technique is called as
A. Conceptual level Datahiding
B. Physical level Datahiding
C. External level Datahiding
D. Logical level Datahiding
View/Hide Ans Correct Answer is C
Explanation
26. A Network Schema
A. restricts to one to many relationship
B. permits many to many relationship
C. stores Data in a Database
D. stores Data in a Relation
View/Hide Correct Answer is B
Ans
Explanation
27. The relation “divides” on a set of positive integers is ________.
A. Symmetric and transitive
B. Anti symmetric and transitive
C. Symmetric only
D. Transitive only
View/Hide Ans Correct Answer is B
Explanation
28. The “PROJECT” operator of a relational algebra creates a new table that has always
A. More columns than columns in original table
B. More rows than original table
C. Same number of rows as the original table
D. Same number of columns as the original table
View/Hide Ans Correct Answer is C
Explanation
29.
The employee information of an Organization is stored in the relation : Employee (name, sex, salary, deptname) Consider the following SQL query Select deptname from Employee Where sex = ‘M’ group by deptname having avg (salary) > {select avg (salary) from Employee} Output of the given query corresponds to
A. Average salary of employee more than average salary of the organization.
B. Average salary less than average salary of the organization.
C. Average salary of employee equal to average salary of the organization
D. Average salary of male employees in a department is more than average salary of the organization
View/Hide Ans Correct Answer is D
Explanation
30.For a database relation R(a, b, c, d) where the domains of a, b, c, d include only the atomic values. The functional dependency a → c, b → d holds in the following relation
A. In 1NF not in 2NF
B. In 2NF not in 3NF
C. In 3NF
D. In 1NF
View/Hide Ans Correct Answer is B
31.Match the following : a.Foreign keys i.Domain constraint b.Private key ii.Referential integrity c.Event control action model iii.Encryption d.Data security iv. Trigger
A. a b c d iii ii i iv
B. a b c d ii i iv iii
C. a b c d iii iv i ii
D. a b c d i ii iii iv
View/Hide Ans Correct Answer is b
Explanation
32. SQL command to delete a column from an existing table:
A. Alter table
B. Drop table
C. Delete table
D. Delete column
View/Hide Ans Correct Answer is a
Explanation
33. With QBE, inserting records from one or more source tables into a single target table can be achieved by:
A. Append action query
B. Update action query
C. Insert action query
D. Make table action query
View/Hide Ans Correct Answer is a
Explanation
34. Tuple in relational algebra refers to:
A. Row
B. Column
C. Table
D. Relation
View/Hide Ans Correct Answer is a
Explanation
35. An attribute or set of attributes within one relation that matches the candidate key of some(possibly the same) relation:
A. Super Key
B. Candidate key
C. Primary key
D. Foreign key
View/Hide Ans Correct Answer is d
Explanation
36. A subset of data in a data warehouse in the form of summary data, related to a particular department or business function:
A. Meta Data
B. Archive data
C. Data Marts
D. Operational Data Store
View/Hide Ans Correct Answer is c
Explanation
37. The normalization of 1NF relations to 2NF involves:
A. Removal of partial dependencies
B. Removal of full dependencies
C. Removal of transitive dependencies
D. Removal of multi-valued dependencies
View/Hide Ans Correct Answer is a
Explanation
38. Why do we go for Normalization of Data Bases?
A. To avoid the repetitions
B. To prevent fragmentation
C. Avoid redundancy
D. To prevent replication
View/Hide Ans Correct Answer is c
Explanation
39. if a relation is in BCNF then it is in:
A. 2 NF
B. 3 NF
C. 1 NF
D. 1 NF and 2 NF
View/Hide Ans Correct Answer is c
Explanation
40. A file is:
A. an abstract data type
B. logical storage unit
C. usually non volatile
D. volatile
View/Hide Ans Correct Answer is c
41. What property of the files prevents sharing of files and directories?
A. Tree structure
B. One level structure
C. Two level structure
D. Length
View/Hide Ans Correct Answer is a
Explanation
42. E-R modeling technique is:
A. Tree structure
B. Top-down method
C. Bottom-up method
D. Right-left approach
View/Hide Ans Correct Answer is b
Explanation
43. Data items stored as grouped items is:
A. Record
B. List
C. Strings
D. Title list
View/Hide Ans Correct Answer is a
Explanation
44. Data items are fragmented, replicated and propagated in:
A. DBMS
B. RDBMS
C. DDBMS
D. DML
View/Hide Ans Correct Answer is c
Explanation
45. If every non-key attribute is functionally dependent on the primary key, then the relation will be in
A. 1NF
B. 2NF
C. 3NF
D. 4NF
View/Hide Ans Correct Answer is c
Explanation
46. which of the following is record based logical model(s)?
A. Network Model
B. Object-oriented model
C. Relational Model
D. Entity Relationship Model
View/Hide Ans Correct Answer is a,c
Explanation
47. In an E-R diagram ellipses represents
A. Entity sets
B. relationship among entity sets
C. attributes
D. link in attributes & entity sets
View/Hide Ans Correct Answer is c
Explanation
48. The set of permitted values for each attribute is called its
A. Attribute set
B. attribute range
C. domain
D. group
View/Hide Ans Correct Answer is c
Explanation
49. Relations produced from an E-R model will always be in
A. 1NF
B. 2NF
C. 3NF
D. 4NF
View/Hide Ans Correct Answer is c
Explanation
50. E-R modeling technique is a
A. Top-down approach
B. Bottom-up approach
C. Left-right approach
D. none of above
View/Hide Ans Correct Answer is a
51. Redundancy is dangerous as it is a potential threat to data
A. Integrity
B. Consistency
C. Sufficiency
D. None
View/Hide Ans Correct Answer is a,b
Explanation
52. Who is more concerned about the conceptual level of the DBMS
A. DBA
B. The end user
C. The Systems programmer
D. Client
View/Hide Ans Correct Answer is a
Explanation
53. An Attribute of one table matching the primary key of another table is called as
A. Foreign key
B. Secondary key
C. Candidate key
D. Composite
View/Hide Ans Correct Answer is a
Explanation
54. If a relation is in BCNF, then it is also in
A. 1NF
B. 2NF
C. 3NF
D. all of above
View/Hide Ans Correct Answer is c
Explanation
55. The way a particular application views the data from the database that the application uses is a
A. Module
B. Relational Model
C. Schema
D. Sub Schema
View/Hide Ans Correct Answer is d
Explanation
56. Locking can be used for:
A. Deadlock
B. Lost Update
C. Uncommitted dependency
D. Inconsistent data
View/Hide Ans Correct Answer is bcd
Explanation
57. In relation Model Column is referred to as :
A. Tuple
B. Entity
C. Degree
D. Attribute
View/Hide Ans Correct Answer is d
Explanation
58. ER Model Comes under
A. Physical data Model
B. Record based logical Model
C. Object based logical Model
D. All of above
View/Hide Ans Correct Answer is c
Explanation
59.Which of the following is the problem of file management system? (a) Lack of data independence(b) Data redundancy(c) Update (d) all Periodically adding, changing, & Deleting file records is called file
A. Updating
B. Upgrading
C. Restructuring
D. Renewing
View/Hide Ans Correct Answer is d
Explanation
60. Which of the following is a relational database
A. 4th Dimensions
B. FoxPro
C. dbase-IV
D. All of the above
View/Hide Ans Correct Answer is a
61. The Index consists of :
A. A list of keys
B. Pointers to the master list
C. Both (a) & (b)
D. None of above
View/Hide Ans Correct Answer is d
Explanation
62. Report generators are used to
A. Store data input by a user
B. retrieve information from files
C. Answer queries
D. Both (b) & (c)
View/Hide Ans Correct Answer is c
Explanation
63. In a relational schema, each tuple is divided into fields called :
A. Relations
B. Domains
C. Queries
D. None of above
View/Hide Ans Correct Answer is d
Explanation
64. The set of permitted values for each attribute is called its :
A. Attribute set
B. Attribute range
C. Domain
D. Group
View/Hide Ans Correct Answer is b
Explanation
65. A DBMS consists of application programs called :
A. FORTRAN
B. AUTOFLOW
C. BPL
D. TOTAL
View/Hide Ans Correct Answer is c
Explanation
66. A locked file can be :
A. Accessed by only one user
B. modified by user with correct password
C. is used to hide sensitive information
D. None
View/Hide Ans Correct Answer is c
Explanation
67. Transaction X holds a shared lock R. if transaction Y requests for a shared lock on R :
A. result in deadlock situation
B. Immediately Granted
C. Immediately rejected
D. Granted as is released by X
View/Hide Ans Correct Answer is b
Explanation
68. command used to select only one copy of each set of duplicable rows :
A. Select Distant
B. Select Unique
C. Select Different
D. None
View/Hide Ans Correct Answer is a
Explanation
69. Which of following is the characteristics of a relational database model?
A. Tables
B. Treelike Structure
C. Complex logical relationship
D. records
View/Hide Ans Correct Answer is acd
Explanation
70. Which command is used to remove rows from a table?
A. Delete
B. Remove
C. Truncate
D. Both (a) & (b)
View/Hide Ans Correct Answer is d
71. Which command is used to remove a table or index from the database in SQL?
A. Delete Table
B. Drop table
C. Erase Table
D. None of above
View/Hide Ans Correct Answer is b
Explanation
72. A report generator is used to :
A. Update files
B. Print files on paper
C. Data Entry
D. None
View/Hide Ans Correct Answer is b
Explanation
73. The modify operation is likely to be done after :
A. Delete
B. Look-up
C. Insert
D. None of above
View/Hide Ans Correct Answer is b
Explanation
74. The database environment has all of the following components except :
A. Users
B. Separate files
C. Database
D. DBA
View/Hide Ans Correct Answer is b
Explanation
75. If every non key attribute is functionally dependent on the primary key, then the relation will be in :
A. 1NF
B. 2NF
C. 3NF
D. 4NF
View/Hide Ans Correct Answer is c
Explanation
76. Director�s Salary details are hidden from the employee, that is :
A. Conceptual level Hiding
B. Physical level data Hiding
C. External level data hiding
D. None of above
View/Hide Ans Correct Answer is c
Explanation
77. Which of the following is record based logical model(s)?
A. Network Model
B. object oriented model
C. Relational Model
D. E-R Model
View/Hide Ans Correct Answer is ac
Explanation
78. The distinguishable parts of a record are called
A. Data
B. files
C. fields
D. All of above
View/Hide Ans Correct Answer is c
Explanation
79. Embedded pointers provide
A. An inverted index
B. a secondary access path
C. a physical record key
D. all of above
View/Hide Ans Correct Answer is b
Explanation
80. Which database handles full text data, image, audio and video?
A. Transaction database
B. Graphics database
C. Video on demand database
D. Multimedia database
View/Hide Ans Correct Answer is d
81. A data dictionary does not provide information about
A. Where data is located
B. who owns it
C. size of disk storage device
D. How the data is used
View/Hide Ans Correct Answer is c
Explanation
82. Data item characteristics that are important in data management include
A. Width
B. language
C. spelling
D. all of above
View/Hide Ans Correct Answer is a
Explanation
83. A schema describes
A. Record & files
B. data elements
C. record relationships
D. all of the above
View/Hide Ans Correct Answer is d
Explanation
84. Data security threat include
A. Privacy invasion
B. hardware failure
C. Fraudulent manipulation of data
D. all of above
View/Hide Ans Correct Answer is a
Explanation
85. Which language is used by most of dbms�s for helping their users to access data?
A. 4GL
B. SQL
C. Query languages
D. HLL
View/Hide Ans Correct Answer is c
Explanation
86. Which of the following is at highest level in the hierarchy of data organization?
A. Data Record
B. data File
C. Database
D. Data Bank
View/Hide Ans Correct Answer is c
Explanation
87. The logical data structure with one to many relationship is a
A. Network
B. Tree
C. Chain
D. All of above
View/Hide Ans Correct Answer is d
Explanation
88. An entry in a telephone book can be compared to a
A. Database
B. File
C. Record
D. Field
View/Hide Ans Correct Answer is c
http://www.brightways.org/ugc-net-gate-mcq-dbms.php?page=9#!
Top Related